A Practical Chosen Message Power Analysis Approach against the Key Whitening Layers on the Loop Architecture
نویسندگان
چکیده
In practice, the key whitening layer is a commonly adopted structure in symmetric ciphers, and the loop architecture is widely applied in hardware implementation of these ciphers. Up to now, conventional DPA is hard to recover the key of such ciphers, since the key whitening layer hides the input (output) of the first (last) round from the plaintext (ciphertext). In this paper, we propose a practical chosen message power analysis approach against the loop architecture of ciphers with the key whitening layers. The starting point of the new approach is the delicate selection of the plaintext set in a chosen message manner, which decreases the space of the plaintext to a reasonable size within the ability of DPA. After choosing the plaintext, we can recover the whitening key through fully exploiting the intermediate variable which is mixed up with the round key and the whitening key. More precisely, we take the round key and the whitening key as a unity and recover it by the chosen message DPA, and then derive the whitening key according to the relationship between the whitening key and the unity. Finally, we can derive the master key from the whitening keys. In order to further manifest the validity of the new approach, we carry extensive experiments on two ISO standardized ciphers CLEFIA and Camellia implemented in loop architecture on FPGA, and the keys are recovered as expected.
منابع مشابه
A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers
The key whitening is a technique intended to enhance the strength of a block cipher. Although some research work involves DPA attacks against the key whitening layer in the compact architecture, there are no literatures dedicated in the influence of the key whitening layers in the loop architecture from the standpoint of DPA. In this paper, we propose a practical chosen message power analysis a...
متن کاملA Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia
The Feistel-SP structure is a commonly adopted structure in symmetric cryptography with many practical instances. Differential power analysis (DPA) has proven to be effective against these ciphers with compact implementations within these years. However, the applications of DPA on Feistel-SP ciphers with loop hardware implementations are more complicated and less evaluated in literature, mainly...
متن کاملEvaluation the theories of semiotics approach in the Reading of Architecture and Urbanism
This essay is considered an attempt to present how semiotic studies can be used as a perceptional aspect in reading architecture and urbanism. Appearance of each art is similar to creation of a “text” which transfers a set of customs, values and thought together with itself. Production of each “text” is based on its context, culture and intellectual bed of its origin society. Each text is an ...
متن کاملDifferential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملA New Approach for Solving Grey Assignment Problems
Linear assignment problem is one of the most important practical models in the literature of linear programming problems. Input data in the cost matrix of the linear assignment problem are not always crisp and sometimes in the practical situations is formulated by the grey systems theory approach. In this way, some researchers have used a whitening technique to solve the grey assignment p...
متن کامل